SecurityXploded.com
Stream Armor : Free Tool to Scan & Clean Malicious Alternate Data Streams (ADS) | www.SecurityXploded.com
StreamArmor
See Also
Contents
 
About

Stream Armor is the sophisticated tool to discover Hidden Alternate Data Streams (ADS) and clean them completely from your system.

It's advanced auto analysis coupled with Online Threat Verification mechanism makes it the best tool available in the market for eradicating the evil streams.

It comes with fast multi threaded ADS scanner which can recursively scan over entire system and quickly uncover all hidden streams. All such discovered streams are represented using specific color patten based on threat level which makes it easy for human eye to distinguish between suspicious and normal streams.

It has built-in Advanced File Type Detection mechanism which examines the content of file to accurately detect the file type of stream. This makes it great tool in Forensic Analysis in uncovering hidden documents/images/audio/video/database/archive files within the alternate data streams.

Stream Armor is fully Portable software and does not require JAVA, .NET or any other components. It works on wide range of platforms starting from Windows XP to Windows 10.

 
What is Alternate Data Stream (ADS) ?

Alternate Data Stream (ADS) is the lesser known feature of Windows NTFS file system which provides the ability to put data into existing files and folders without affecting their functionality and size. Any such stream associated with file/folder is not visible when viewed through conventional utilities such as Windows Explorer or DIR command or any other file browser tools.

It is used legitimately by Windows and other applications to store additional information (for example summary information) for the file. Even 'Internet Explorer' adds the stream named 'Zone.Identifier' to every file downloaded from the internet.

Due to this hidden nature of ADS, hackers have been exploiting this method to secretly store their Rootkit components on the compromised system without being detected. For example, the infamous Rootkit named 'Mailbot.AZ' aka 'Backdoor.Rustock.A' used to hide its driver file into system32 folder (C:\Windows\system32) as a stream '18467'.

In short, ADS provides easy way to store the malicious content covertly as well as execute it directly without making even a bit of noise. Only sophisticated tools such as StreamArmor has the ability to discover and destroy these hidden malicious streams.

For complete details on 'Alternate Data Streams' please refer to the following article, 'Exploring Alternate Data Streams'

 
Features
  • Fast, multi threaded ADS scanner to quickly and recursively scan entire computer or drive or just a folder.
  • 'Snapshot View' for quick identification of selected stream and faster manual analysis.
  • Option to 'Ignore Known and Zero Streams' which automatically ignores all known streams (such as Zone.Identifier) and streams with zero size, thus greatly reducing time and effort involved in manual analysis.
  • Advanced stream file type detection which analyzes internal content of file to detect the real file type rather than just going by the file extension. Here is the list of some of the major file type categories detected by StreamArmor     
    • Executable File Type (EXE, DLL, SYS, COM, MSI, CLASS)
    • Archive File Type (ZIP, RAR, TAR, GZ, COM)
    • Audio File Type (MP3, WAV, RA, RM, WMA, M3U)
    • Video File Type (WMV, AVI, MPEG, MP4, SWF, DIVX, FLV, DAT, VOB, MOV)
    • Database Type (MS ACCESS)
    • Document Type (PDF, XML, DOC, RTF, All MS Office old & new formats)
  • Sophisticated 'Auto Threat Analysis' based on heuristic technology for identifying anomaly in the discovered streams based on the characteristics and patterns.
  • 'Online Threat Verification' to check for presence of Virus or Rootkit in the suspicious stream using any of the following prominent online websites
    • VirusTotal (www.VirusTotal.com)
    • ThreatExpert (www.ThreatExpert.com)
    • MalwareHash (www.MalwareHash.com)
  • Representation of streams using color pattern based on threat level makes it easy and fast for human eye to distinguish between suspicious streams from normal ones.
  • Parallel analysis of discovered streams during the scanning process, allows user to start with analysis immediately without waiting for entire scanning operation to be completed.
  • View the entire content of selected stream using the configured third party application. In fact user can configure different applications for normal & executable stream file.
  • Save the selected stream file content to a disk, or USB drive or DVD for further analysis.
  • Delete the selected alternate data stream (ADS) from its base file or folder.
  • Execute/Run the selected executable stream file for analyzing its malicious nature in virtual environments such as VMWare.
  • Dynamic performance tuning mechanism by adjusting the ADS scan thread count [only for advanced users].
  • Sort feature to arrange the scanned streams based on its name/threat level/content type/size.
  • Export the entire list of discovered streams to a disk file in HTML format for offline analysis.
 
Installation & Un-installation
Though StreamArmor is a Portable tool, it comes with Installer so that you can install it locally on your system for regular usage. This installer has intuitive wizard which guides you through series of steps in completion of installation.
At any point of time, you can uninstall the product using the Uninstaller located at following location (by default)
[Windows 32 bit]
C:\Program Files\SecurityXploded\StreamArmor

[Windows 64 bit]
C:\Program Files (x86)\SecurityXploded\StreamArmor
 
 
Screenshots
Screenshot 1: StreamArmor detecting Rootkits such as HackerDefender, Agent.X, Vanquish etc in addition to other hidden streams.
StreamArmor Scanning for Hidden Streams
Screenshot 2: StreamArmor displaying the snapshot view of the selected Rootkit stream file which clearly shows that its a executable file (starting with "MZ").
StreamArmor showing the snapshot view
Screenshot 3: Online threat verification of uncovered 'HackerDefender' Rootkit stream file using VirusTotal.com.
StreamArmor showing online threat verification
Screenshot 4: HTML Report generated by Stream Armor showing scan summary along with detailed Threat analysis.
StreamArmor showing the exported scan list
 
 
Release History
Version 4.1: 27th Aug 2016
Fixed the minor bug in checking OS version on Windows 10.
 
Version 4.0: 16th Aug 2016
Mega release to support for windows 10 version.
 
Version 3.0: 12th May 2014
Support for detecting Dropbox related streams. Also include GUI improvements.
 
Version 2.5: 22nd Mar 2013
Now supports Windows 8 platform. Quick Drag & Drop of scan folder.
 
Version 2.0: 21st Apr 2012
Right click menu for quick actions, enhanced HTML report, improved user interface with cool banner.
 
Version 1.5: 14th Feb 2011
Improved user interface, New version detector & Installer.
 
Version 1.1: 10th Sep 2010
Fixed autoanalysis related issues on Non-English systems, Changes to VirusTotal verification and other usability related changes.
 
Version 1.0: 27th Mar 2010
First public release of StreamArmor
 
 
Download
FREE Download Stream Armor v4.1

License  : Freeware
Platform : Windows XP, 2003, Vista, Windows 7, Windows 8, Windows 10

Download
See Also